Methods and systems for Sustained Testing and Awareness Refresh against phishing threats (STAR*Phish™) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target e-mail addresses associated with a user accounts. The method delivers e-mail messages to the targeted e-mail addresses, the e-mail messages comprising an HTTP request and a unique identifier associated with each of the user accounts. The method then receives, at a phishing metric tool (PMT), a response including the unique identifier. The PMT logs training requirements for the user accounts, tracks response metrics for the training requirements, and redirects the respective HTTP requests to a phishing training tool (PTT). The PTT sends a notification of the user account identities and the unique identifiers to the PMT and returns a status for the training requirements for the user accounts. Upon completion of the training, the PMT sends completion notifications for the user accounts.
|
10. A non-transitory computer readable storage medium having program instructions stored thereon for identifying and mitigating information security risks, the instructions being executable by a processor of a computing device, the instructions comprising:
instructions for receiving, at a phishing metrics tool (PMT), a phishing hypertext transfer protocol (HTTP) request;
instructions for sending a redirect message from the PMT to a browser session;
instructions for receiving, at a phishing training tool (PTT), a request for an application, wherein the request is based at least in part on the received phishing HTTP request;
instructions for sending, from the PTT to the browser session, the requested application;
instructions for sending, from the PTT, a start message for a first training requirement;
instructions for sending, from the PTT, a training exercise associated with the first training requirement;
instructions for returning a status report for the first training requirement, the status report including an indication of whether at least a portion of the first training requirement has been failed; and
instructions for redirecting, by the PMT, the browser session to undergo an additional training requirement related to portion of the first training requirement which was failed, upon receipt of the status report, when the status report indicates that the at least the portion of the first training requirement has been failed so that a user using the browsing session is subjected to the additional training requirement.
1. A computer-implemented method for identifying and mitigating information security risks, the method comprising:
assigning unique identifiers to a plurality of target e-mail addresses, wherein each e-mail address is associated with an individual user account, respectively;
delivering an e-mail message to one or more of the plurality of target e-mail addresses, wherein the e-mail message comprises a hypertext transfer protocol (HTTP) request and a unique identifier associated with a user account;
receiving, at a phishing metric tool (PMT), a response including the unique identifier;
logging, by the PMT, a training requirement for the user account;
tracking, by the PMT, response metrics for the training requirement;
redirecting the HTTP request to a phishing training tool (PTT);
sending, by the PTT, a notification of a verified identity of the user account and the unique identifier to the PMT;
returning a status report for the training requirement, the status report including an indication of whether the user account has failed at least a portion of the training requirement; and
redirecting, by the PMT, the user account to undergo an additional training requirement related to the portion of the training requirement which was failed, upon receipt of the status report, when the status report indicates that the user account has failed at least the portion of the training requirement so that the user account is subjected to the additional training requirement,
wherein the PMT and the PTT are respectively implemented by at least one processor of a computer processing device.
16. A system capable of identifying and mitigating information security risks, the system comprising:
a phishing metric tool (PMT) configured to:
receive a phishing hypertext transfer protocol (HTTP) request from a browser session; and
send a redirect message to the browser session, the redirect message redirecting the browser session to a phishing training tool (PTT);
an e-mail server configured to:
send an e-mail message to a target user account, wherein the e-mail message is based on the phishing HTTP request, and wherein the e-mail message includes a unique identifier; and
receive a response from the target user account, wherein the response includes the unique identifier;
wherein the PTT is configured to:
receive an application request based on the response;
send the requested application to the browser session;
send a start message for a training requirement for the target user account;
send a training exercise associated with the training requirement;
send a notification to the PMT of an identity of the target user account and the unique identifier; and
update a status of the training exercise, the status of the training exercise including an indication of whether the user account has failed at least a portion of the training requirement,
wherein the PMT is configured to redirect the user account to undergo an additional training requirement related to portion of the training requirement which was failed, upon receipt of the status, when the status indicates that the user account has failed at least the portion of the training requirement so that the user account is subjected to the additional training requirement, and
wherein the PMT and the PTT are respectively implemented by at least one processor of a computer processing device.
2. The method of
3. The method of
updating, by the PMT, the status of the training requirement,
wherein the status is based at least in part on the tracked response metrics.
4. The method of
a response to the e-mail message has not been received;
the training exercise is underway;
the training exercise has been completed unsuccessfully;
the training exercise has been completed successfully;
a certificate for a successfully completed training exercise has been generated; and
a notification for a completed training exercise has been sent.
5. The method of
6. The method of
sending a reminder notification to the target e-mail address in response to determining that the user account has not completed information security training within a pre-determined period of time.
7. The method of
8. The method of
sending a reminder notification to the administrator e-mail address in response to determining that the user account has not completed information security training within a pre-determined period of time.
9. The method of
receiving, at the PTT, credentials for the user account;
validating, by the PTT, the credentials for the user account; and
verifying a login to the user account based upon the validated credentials; and
sending a start exercise message for the training exercise based upon verifying the login.
11. The non-transitory computer readable storage medium of
instructions for determining whether the training exercise has been completed; and
instructions for generating a completion message in response to determining that the training exercise has been completed.
12. The non-transitory computer readable storage medium of
instructions for sending the completion message from the PTT to the PMT in response to determining that the training exercise has been completed.
13. The non-transitory computer readable storage medium of
14. The non-transitory computer readable storage medium of
15. The non-transitory computer readable storage medium of
17. The system of
18. The system of
19. The system of
20. The system of
|
This application is a continuation of U.S. application Ser. No. 13/297,570 filed on Nov. 16, 2011, claims priority to U.S. Provisional Application No. 61/414,142, filed on Nov. 16, 2010, and U.S. Provisional Application No. 61/502,678, filed on Jun. 29, 2011. The entire contents of these prior applications are incorporated by reference in their entireties.
1. Field of the Disclosure
The field of the disclosure relates generally to information security training, and, more particularly, to phishing awareness training.
2. Description of the Related Art
Social engineering attacks, such as phishing, constitute a common threat to organization's information technology (IT) enterprise systems and data. Phishing attacks target individual users and seek to exploit them as the weakest link in the information security chain.
Conventional information security training consists of static presentations or test events that are exercised on a periodic basis (i.e., annually, quarterly, or monthly). However, given that attack methodologies are constantly evolving, information security threats quickly outpace the level of conventional training. This is especially true in the social engineering attack context. Accordingly, what is needed is more sophisticated information security training to better protect organizations and their data from these ever-evolving threats.
Traditional training techniques, such as annual data security training, are not targeted to susceptible users and fail to provide a consistent level of user awareness of security threats such as social engineering attacks. Accordingly, what is needed are systems and methods for providing a consistent level of user awareness and exploitation of a “teachable moment” operand conditioning in order to provide focused training for susceptible users.
The present disclosure is directed to exemplary methods, exemplary apparatus and exemplary systems that provide phishing awareness training to targeted users.
Based on service-oriented design, exemplary embodiments of the present disclosure provide awareness on evolving threats as they are detected, rather than waiting for annual or quarterly training efforts. Additionally, exemplary embodiments disclosed herein provide tailored exercises which can be geared towards specific staff, such as new hires or contractors. Metrics from exercises can be tracked over time to determine the effectiveness of training across various objectives and organizational demographics as well.
Additionally, tailored exercises can be geared towards specific, targeted user accounts, such as, but not limited to, user accounts associated with new hires, contractors, or users who have demonstrated a propensity for falling victim to social engineering attacks, either simulated or real, in the past.
Techniques for Sustained Testing and Awareness Refresh against Phishing threats (STAR*Phish™) disclosed herein are distinguishable from conventional techniques in several ways. One key premise of the systems and methods disclosed herein is to focus on exploiting a “teachable moment” to target training towards susceptible users, which is an emerging concept that the training systems described herein are built around. In accordance with an exemplary embodiment, users are trained in live exercises coordinated with incident response personnel, and those users who fall victim are immediately transferred to a training component. According to an exemplary embodiment, STAR*Phish™ includes two components: a Phishing Metrics Tool (PMT), and a Phishing Training Tool (PTT).
While training provides an engaging environment to learn about various attack methodologies used in phishing, it is also tailored to reinforce correct reporting procedures. In the course of training, users are shown the correct and safe way to report phishing, which goes beyond what most available training resources currently provide. While providing information on the threat, STAR*Phish™ also provides information on responding to the threat within the environment the user operates in.
This response process is customized to client policies and procedures, rather than an ambiguous response approach that might not be relevant for all users. STAR*Phish™ takes a unique approach from an architectural standpoint as well, by providing a dual-domain system. According to an embodiment, the PMT is hosted on an external, un-trusted domain which lends credibility to the security threat for all responses. According to this example embodiment, users are actually clicking on links and being directed to websites that are external to their organization's environment, rather than accessing a simulated capture site inside their own, trusted environment. However, the PMT directs users to training which is located on a trusted internal site associated with their organization. In this way, the “bait” provides a high level of realism, but once the response is captured users are provided training on a trusted domain. This increases the likelihood that users will continue with their training requirement, rather than assuming the training is part of a phishing attack.
The PMT provides several unique capabilities. First, the phishing exercises allow phishing e-mails to be customized, including a wide variety of attacks such as attachments and full credential captures. The responses, and the “teachable moment”, can be caught at varying stages depending on the objectives of the exercise. For example, users can be directed to training immediately after clicking a link, or can be allowed to enter credentials or run embedded code before being transferred to training. Additionally, the metrics being tracked by the PMT are extremely diverse and not currently provided in such depth by conventional training systems. The PMT tracks response types, shows response graphs based on IP and target email, illustrates geographic distributions of responses, and even uses heuristics to determine social network maps and potential administrative hosts. The PMT also has an agent-based design that can be used to run distributed phishing exercises according to client requirements. Agents can be used to distribute phishing e-mails, track responses, and update a central collection agent that tracks the metrics.
Finally, STAR*Phish™ is modular, and can be tailored to meet specific client needs. If requested, the PMT can be used to run stand-alone exercises as part of penetration tests, or the PTT can be implemented to provide a stand-alone training resource.
In an embodiment, a computer-implemented method for training disclosed herein provides distinguishing features not found in conventional training systems. In accordance with an exemplary embodiment, there are two ways that users can take the training: voluntarily or as part of a mandatory requirement. Voluntary training is promoted through social media, including communities of practice and demonstrations. In accordance with an exemplary embodiment, users are provided with an ADOBE™ Flash-based training simulation that provides a virtual e-mail client interface, mimicking what they are likely to use in normal operations. In an alternative exemplary embodiment, the training simulation is ADOBE™ Flex-based. In yet another alternative exemplary embodiment, the training simulation is implemented in the HTML5 language.
If users have been directed to the training as a result of responding to a phishing e-mail, they are immediately trained on the e-mail that they were targeted with, capitalizing on the threat to which they have responded. Additionally, the mandatory training component is tracked as part of the live exercises, and users are sent notifications of their training requirement. This notification system, incorporated into the PMT, prevents users from simply ignoring poor security practices.
The present disclosure is directed to exemplary systems, architectures, methods, and non-transitory computer readable storage media for implementing STAR*Phish™.
Further features and advantages of the present disclosure, as well as the structure and operation of various embodiments thereof, are described in detail below with reference to the accompanying drawings. It is noted that the present disclosure is not limited to the specific embodiments described herein. Such embodiments are presented herein for illustrative purposes only. Additional embodiments will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein.
The accompanying drawings, which are incorporated herein and form part of the specification, illustrate exemplary embodiments of the present disclosure and, together with the description, further serve to explain principles, aspects and features of the present disclosure. The exemplary embodiments are best understood from the following detailed description when read in conjunction with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity. Included in the drawings are the following figures:
The features and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. Generally, the drawing in which an element first appears is indicated by the leftmost digit(s) in the corresponding reference number.
The present disclosure relates to systems and methods for providing sustained testing and awareness against social engineering threats to information security, such as phishing threats. In particular, the systems and methods provide sustained user awareness training mechanism in a continuous, ongoing fashion and within a Web 2.0 training environment with live phishing exercises. In contrast to traditional periodic (e.g., annual) training, the systems and methods of the present disclosure provide a consistent level of user awareness and exploit “teachable moment” operand conditioning in order to provide focused training for users susceptible to social engineering attacks. Based on its service-oriented design, an exemplary system is able to provide awareness on evolving threats as they are detected, instead of waiting for an annual or quarterly training course. Additionally, tailored exercises delivered by the system can be geared towards specific staff, such as new hires or contractors. Metrics from the exercises can be tracked over time to determine effectiveness of training across various objectives and organizational demographics as well.
Embodiments of the systems and methods disclosed herein provide focused phishing awareness training wherein “teachable moments” are exploited so as to provide focused training for users that have demonstrated susceptibility to phishing. The systems and methods also adapt to evolving threats by including live exercises that are performed regularly with escalated complexity based on the level of user awareness demonstrated in previously-completed exercises. In embodiments, metrics from the exercises are tracked over time to determine the effectiveness of training across various objectives and organizational demographics. Embodiments also include customized training including components that can be implemented separately or in tandem to meet an organization's specific needs by merging testing and training components.
According to embodiments disclosed herein, live training exercises are coordinated using the PMT to allow testers to develop and send convincing, realistic phishing e-mail messages, track responses in real-time, and analyze and track metrics such as, but not limited to, response rates. As user responses are tracked by the PMT, teachable moments are exploited to train users while actions and perceptions are still fresh. In an embodiment, individual exercise components can be run without training to establish base metrics. Alternatively, exercise components can be included as part of an organization's penetration testing, which analyzes the impact of successful phishing attacks.
The methods and systems disclosed herein offer a training simulation that provides an engaging and informative environment that walks users through identification of suspicious e-mail messages and reinforces organizational reporting procedures. Embodiments of the training require uses to be fully engaged so that they are not merely clicking through and acknowledging a pre-determined sequence of screens. The training can be offered as a stand-alone component as well as a voluntary training resource. Through sustained use of the training, as opposed to traditional periodic training offered at set times, evolving threats are addressed and users are provided with consistent training opportunities that maintain user awareness at all times.
While the present disclosure is described herein with reference to illustrative embodiments for particular applications, it is to be understood that the invention is not limited thereto. Those skilled in the art with access to the teachings provided herein will recognize additional modifications, applications, and embodiments within the scope thereof and additional fields in which the invention would be of significant utility.
Unless specifically stated differently, in an embodiment, a user is interchangeably used herein to identify a human user, a software agent, or a group of users and/or software agents. Besides a human user who may be susceptible to information security breaches and phishing threats, a software application or agent sometimes can fall prey to information security attacks. Accordingly, unless specifically stated, the terms “user” and “user account” as used herein do not necessarily pertain to a human being.
System 100 utilizes a unique combination of training tied to a phishing exercise (e.g., a simulated attack via email messages). Phishing exercises, such as the ADOBE™ Flex and Flash training application 112 depicted in
PTT 102/PMT 124 communications include the unique identifier in order to enable tracking of logins for user accounts 132 and training status. An update process allows PTT 102 to retrieve specific exercise e-mails from PMT 124 and include these in the training for targeted user accounts 132.
System 100 has multiple components, each with a highly specialized function. The Phishing Training Tool (PTT) 102 is a data-driven training interface that is used to train susceptible users. In an embodiment, the Phishing Metrics Tool (PMT) 124 is a web-based content development and management interface that is used to generate phishing e-mails, such as Post Office Protocol (POP) and Internet message access protocol (IMAP) e-mail messages 103, and track responses.
Deployment of system 100 for an organization entails customizing the components depicted in
In order to provide realistic phishing exercises, in certain embodiments some aspect of the phishing exercise architecture for system 100 may reside on an untrusted domain external to the internal network 114 of the organization. For example, PMT 124, its PMT database server 126, and its web server 128, may reside on an untrusted domain external to internal network 114 and PTT database server 104 and e-mail server 122, which each reside on a trusted domain. As described below with reference to
Although PTT and PMT database servers 104 and 126 are shown in the exemplary embodiment of
With continued reference to
The method begins when target e-mail addresses for user accounts 132 are respectively assigned schemes and unique identifiers by PMT 124. In an embodiment, structured query language (SQL) statements 106 are sent between PMT database server 126 and web server 128 within PMT 124 to accomplish the assignment of schemes and unique identifiers.
Next, e-mail messages are delivered to user accounts 132 with respective unique identifiers. As shown in the exemplary embodiment of
Then, a vulnerable user logged into a user account 132 supplies a response to PMT 124 via an HTTP/HTTPS request 110 to web server 128. The HTTP/HTTPS request 110 includes the unique identifier discussed above. At this point, PMT 124 updates a status for the responding user account 132, logs a training requirement, and tracks response metrics for user account 132. As illustrated in
Next, the user associated with user account 132 is redirected to PTT 102 in real-time immediately after capturing the response, thus exploiting a “teachable moment” while the user's susceptibility to the simulated phishing attack is fresh in his mind. This re-direct can be accomplished by sending an HTTP/HTTPS redirect request 110 from to user account 132 from training application 112 within PTT 102. Although training application 112 is depicted in as an ADOBE™ Flex or Flash application, it is understood that training application 112 can be implemented in other development environments and languages, such as, but not limited to, HTML5.
As an optional step, user account 132 may be directed to PTT 102 via another HTTP/HTTPS request 110 from the training application 112 after a reminder notification has been sent. User account 132 may also be sent an HTTP/HTTPS response 110 from the training application 112 via web server 128 for voluntary training. In another optional step, user credentials for user account 132 are sent via a Lightweight Directory Access Protocol (LDAP) request 118 from servlet 108 to account database 116 within internal network 114. These user credentials can then be validated, providing confirmation of the identity of a user account 132 respondent. Next, PTT 102 sends notification of respondent identity and identifier to PMT 124 via an HTTP/HTTPS response 110.
During the execution of training application 112 by the user associated with user account 132, PMT 124 iteratively updates the training status and returns training exercise e-mail contents as applicable. According to one embodiment, this can be done by sending SQL statements 106 between PMT database server 126 and web server 128.
As an optional step, PMT 124 may send a reminder notification in response to determining that a user associated with a user account 132 does not complete the training within a designated time period. This notification can be sent via POP/IMAP e-mail messages 103 from e-mail server 122 to user account 132. In embodiments, the designated time period is a tunable parameter that can be adjusted by a training or system administrator of internal network 114. For example, the time period may be set to a predetermined number of hours, days, or weeks, as deemed necessary by the administrator.
Upon determining that the training has been completed by the user associated with user account 132, PTT 102 sends a completion notification. This notification can be sent as an HTTP/HTTPS response 110 between training application 112 and web server 128. In one embodiment, this step may additionally include generation and display of a completion certificate by training application 112. According to embodiments, the completion notification and/or certificate can be sent to user account 132 and an administrator for internal network 114.
Lastly, PMT 124 updates the status for user account 132 and sends a completion e-mail message to user account 132. As shown in
As part of coordination tasks, an organization (i.e., “Client Y” in the exemplary embodiments of
In accordance with an embodiment, customized version of the base instance of PTT 102, such as the client Y PTT instance 219 depicted in
As shown in
Client Y PMT instance 209 sends e-mail messages 203 to a client-designated mail server, such as public mail server 202. Next, a susceptible user associated with a user account 132 within client network 204 clicks on a simulated phishing link/URL, triggering an HTTP/HTTPS request 205 to client Y PMT instance 209. According to an embodiment, client network 204 may be internal network 114 described above with reference to
At this point, user account 132 is redirected to Client Y PTT instance 219 via an HTTP/HTTPS redirect request 213. Next, client Y PTT instance 219 and client Y PMT instant 209 coordinate training content and track completion statistics. As illustrated in
Within architecture 210, Distributed Phishing Agents (DPA) 201 are registered domains with no traceable connection to the host organization or internal network 114, and serve as proxies for capturing responses. According to an embodiment, DPAs 201 are registered domains that act as proxies that redirect users to appropriate resources, allowing the exercises to use a variety of links and avoid altered responses based on recognition of target uniform resource locators (URLs).
As show in
Next, the user associated with user account 132 is redirected to client Y PTT instance 219 via an HTTP/HTTPS redirect 213 sent from the DPA 201 to client Y PTT instance 219. As shown in
At this point in the process, client Y PTT instance 219 and client Y PMT instant 209 coordinate training content, track completion statistics. As illustrated in
Method 300 handles cases where a phishing HTTP request is sent from a browser session in response to a susceptible user clicking on a simulated phishing link. According to an embodiment, the browser session may be an Internet browser web-based e-mail client launched by a user associated with a user account 132 to read e-mail delivered by e-mail server 122.
Method 300 begins at step 336 where a phishing HTTP/HTTPS request is sent from browser 334 to PMT 124. As would understood by persons skilled in the relevant art, the method 300 can be applied to various Internet browsers, including, but not limited to, MICROSOFT™ Internet Explorer, Mozilla Firefox, GOOGLE™ Chrome, APPLE Safari, and OPERA™.
In step 338, a redirect message is sent from PMT 124 to browser 334 so that in step 340, an application request can be sent from browser 334 to PTT 102. The request sent in step 340 can be for any embodiment of training application 112 described above with reference to
In step 342, training application 112 is sent from PTT 102 to browser 334. Although training application 112 is shown in
In steps 344-354, which are included in an optional login process within method 300, login credentials for user account 132 are sent and verified.
In step 344, login credentials for user account 132 are sent from browser 334 to PTT 102, which in turn forwards the credentials to servlet 108 in step 346. While servlet 108 is depicted in
In step 348, an LDAP request 118 is sent by servlet 108 so that the credentials can be successfully verified in step 349. As described above with reference to
In step 350, an LDAP-verification status is sent to servlet 108 so that the user account 132 can be logged in and a user session can be created in step 352.
In step 354, an indication of the verified login is sent from servlet 108 to PTT 102.
In step 356, an advance page is sent from PTT 102 to browser 334. In an embodiment, this advance page indicates in the browser session that a training exercise is required.
In step 358, a start exercise message is sent from PTT 102 to PMT 124. According to an embodiment, the start exercise message includes a unique identifier uniquely identifying the user account 132 that needs to complete the exercise provided by training application 112.
In step 360, the user associated with user account 132 can review informational slides regarding the exercise, which are displayed by browser 334.
In step 362, a request for the exercise is sent from browser 334 to PTT 102. Although the exercise is shown as an ADOBE™ Flex-based exercise in
In step 364, the exercise is sent from PTT 102 to browser 334 so that the user associated with user account 132 can run the exercise on browser 334 in step 366.
In step 368, upon completion of the exercise, a completion notification is sent from browser 334 to PTT 102 and in response, PTT 102 sends an exercise completion message to PMT 124 in step 370.
In step 372, the user associated with user account 132 can optionally send a request from browser 334 to PTT 102 so that PTT 102 can send an HTML completion certificate back to browser 334 in step 374.
According to an embodiment, browser 334 may display the exemplary interface illustrated in
By clicking create classification link 476, an administrator for internal network 114 can create a classification for a training exercise. By selecting template links 478, the administrator can create and edit schemes.
Along with disseminating the phishing e-mail messages, PMT 124 can aggregate and track metrics for both past and ongoing exercises through use of control tasks link 488 within management links 480. Reporting links 482 within administrative interface 400 allow viewing of e-mail demographics, task status, and training metrics reports.
As shown in
Upon determining that a user has selected phishing hyperlink 594, the notification screen depicted in
In the exemplary embodiment shown in
Although exemplary embodiments have been described in terms of a computer implemented method or apparatus, it is contemplated that it may be implemented by microprocessors of a computer, such as the computer system 1300 illustrated in
Aspects of the present disclosure shown in
If programmable logic is used, such logic may execute on a commercially available processing platform or a special purpose device. One of ordinary skill in the art may appreciate that embodiments of the disclosed subject matter can be practiced with various computer system configurations, including multi-core multiprocessor systems, minicomputers, mainframe computers, computers linked or clustered with distributed functions, as well as pervasive or miniature computers that may be embedded into virtually any device.
For instance, at least one processor device and a memory may be used to implement the above described embodiments. A processor device may be a single processor, a plurality of processors, or combinations thereof. Processor devices may have one or more processor “cores.”
Various embodiments of the present disclosure are described in terms of this example computer system 1300. After reading this description, it will become apparent to a person skilled in the relevant art how to implement the present disclosure using other computer systems and/or computer architectures. Although operations may be described as a sequential process, some of the operations may in fact be performed in parallel, concurrently, and/or in a distributed environment, and with program code stored locally or remotely for access by single or multi-processor machines. In addition, in some embodiments the order of operations may be rearranged without departing from the spirit of the disclosed subject matter.
Processor device 1304 may be a special purpose or a general purpose processor device. As will be appreciated by persons skilled in the relevant art, processor device 1304 may also be a single processor in a multi-core/multiprocessor system, such system operating alone, or in a cluster of computing devices operating in a cluster or server farm. Processor device 1304 is connected to a communication infrastructure 1306, for example, a bus, message queue, network, or multi-core message-passing scheme.
Computer system 1300 also includes a main memory 1308, for example, random access memory (RAM), and may also include a secondary memory 1310. Secondary memory 1310 may include, for example, a hard disk drive 1312, removable storage drive 1314. Removable storage drive 1314 may comprise a floppy disk drive, a magnetic tape drive, an optical disk drive, a flash memory, or the like.
The removable storage drive 1314 reads from and/or writes to a removable storage unit 1318 in a well known manner. Removable storage unit 1318 may comprise a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 1314. As will be appreciated by persons skilled in the relevant art, removable storage unit 1318 includes a non-transitory computer usable storage medium having stored therein computer software and/or data.
In alternative implementations, secondary memory 1310 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 1300. Such means may include, for example, a removable storage unit 1322 and an interface 1320. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, and other removable storage units 1322 and interfaces 1320 which allow software and data to be transferred from the removable storage unit 1322 to computer system 1300. Computer system 1300 may also include a communications interface 1324.
Communications interface 1324 allows software and data to be transferred between computer system 1300 and external devices. Communications interface 1324 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, or the like. Software and data transferred via communications interface 1324 may be in the form of signals, which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 1324. These signals may be provided to communications interface 1324 via a communications path 1326. Communications path 1326 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link or other communications channels. In this document, the terms “computer program medium,” “non-transitory computer readable medium,” and “computer usable medium” are used to generally refer to media such as removable storage unit 1318, removable storage unit 1322, and a hard disk installed in hard disk drive 1312. Signals carried over communications path 1326 can also embody the logic described herein. Computer program medium and computer usable medium can also refer to memories, such as main memory 1308 and secondary memory 1310, which can be memory semiconductors (e.g. DRAMs, etc.). These computer program products are means for providing software to computer system 1300.
Computer programs (also called computer control logic) are stored in main memory 1308 and/or secondary memory 1310. Computer programs may also be received via communications interface 1324. Such computer programs, when executed, enable computer system 1300 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor device 1304 to implement the processes of the present disclosure, such as the stages in the methods illustrated by the message sequence chart 300 of
Embodiments of the present disclosure also may be directed to computer program products comprising software stored on any computer useable medium. Such software, when executed in one or more data processing device, causes a data processing device(s) to operate as described herein. Embodiments of the present disclosure employ any computer useable or readable medium. Examples of computer useable mediums include, but are not limited to, primary storage devices (e.g., any type of random access memory), secondary storage devices (e.g., hard drives, floppy disks, CD ROMS, ZIP disks, tapes, magnetic storage devices, and optical storage devices, MEMS, nanotechnological storage device, etc.), and communication mediums (e.g., wired and wireless communications networks, local area networks, wide area networks, intranets, etc.).
It is to be appreciated that the Detailed Description section, and not the Summary and Abstract sections, is intended to be used to interpret the claims. The Summary and Abstract sections may set forth one or more but not all exemplary embodiments of the present disclosure as contemplated by the inventor(s), and thus, are not intended to limit the present disclosure and the appended claims in any way. Embodiments of the present disclosure have been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed.
The foregoing description of the specific embodiments will so fully reveal the general nature of the present disclosure that others can, by applying knowledge within the skill of the art, readily modify and/or adapt for various applications such specific embodiments, without undue experimentation, without departing from the general concept of the present disclosure. Therefore, such adaptations and modifications are intended to be within the meaning and range of equivalents of the disclosed embodiments, based on the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by the skilled artisan in light of the teachings and guidance.
The breadth and scope of the present disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Fritzson, Art, Bezrukov, Semion, Palka, Sean
Patent | Priority | Assignee | Title |
10038711, | Jan 30 2017 | XM Cyber Ltd | Penetration testing of a networked system |
10068095, | May 15 2017 | XM Cyber Ltd | Systems and methods for selecting a termination rule for a penetration testing campaign |
10122750, | Jan 30 2017 | XM Cyber Ltd | Setting-up penetration testing campaigns |
10187407, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
10257220, | Jan 30 2017 | XM Cyber Ltd | Verifying success of compromising a network node during penetration testing of a networked system |
10367846, | Nov 15 2017 | XM Cyber Ltd | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
10382473, | Sep 12 2018 | XM Cyber Ltd | Systems and methods for determining optimal remediation recommendations in penetration testing |
10412112, | Aug 31 2017 | XM Cyber Ltd | Time-tagged pre-defined scenarios for penetration testing |
10440044, | Apr 08 2018 | XM Cyber Ltd | Identifying communicating network nodes in the same local network |
10447721, | Sep 13 2017 | XM Cyber Ltd | Systems and methods for using multiple lateral movement strategies in penetration testing |
10454966, | Nov 15 2017 | XM Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
10462177, | Feb 06 2019 | XM Cyber Ltd | Taking privilege escalation into account in penetration testing campaigns |
10469521, | Nov 04 2018 | XM Cyber Ltd | Using information about exportable data in penetration testing |
10505969, | Jan 30 2017 | XM Cyber Ltd | Setting-up penetration testing campaigns |
10534917, | Jun 20 2017 | XM Cyber Ltd | Testing for risk of macro vulnerability |
10574684, | Jul 09 2017 | XM Cyber Ltd | Locally detecting phishing weakness |
10574687, | Dec 13 2018 | XM Cyber Ltd | Systems and methods for dynamic removal of agents from nodes of penetration testing systems |
10581802, | Mar 16 2017 | KEYSIGHT TECHNOLOGIES SINGAPORE SALES PTE LTD | Methods, systems, and computer readable media for advertising network security capabilities |
10637882, | Jan 30 2017 | XM Cyber Ltd | Penetration testing of a networked system |
10637883, | Jul 04 2019 | XM Cyber Ltd | Systems and methods for determining optimal remediation recommendations in penetration testing |
10686822, | Jan 30 2017 | XM Cyber Ltd | Systems and methods for selecting a lateral movement strategy for a penetration testing campaign |
10788984, | May 08 2015 | BANMA ZHIXING NETWORK HONG KONG CO , LIMITED | Method, device, and system for displaying user interface |
10819744, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
10880326, | Aug 01 2019 | XM Cyber Ltd. | Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic |
10999308, | Jan 30 2017 | XM Cyber Ltd | Setting-up penetration testing campaigns |
11005878, | Nov 07 2019 | XM Cyber Ltd | Cooperation between reconnaissance agents in penetration testing campaigns |
11206281, | May 08 2019 | XM Cyber Ltd. | Validating the use of user credentials in a penetration testing campaign |
11206282, | Nov 15 2017 | XM Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
11283827, | Feb 28 2019 | XM Cyber Ltd. | Lateral movement strategy during penetration testing of a networked system |
11533329, | Sep 27 2019 | KEYSIGHT TECHNOLOGIES, INC. | Methods, systems and computer readable media for threat simulation and threat mitigation recommendations |
11575700, | Jan 27 2020 | XM Cyber Ltd. | Systems and methods for displaying an attack vector available to an attacker of a networked system |
11582256, | Apr 06 2020 | XM Cyber Ltd. | Determining multiple ways for compromising a network node in a penetration testing campaign |
9325730, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
9356948, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
9398038, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
9591017, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
9635052, | May 05 2015 | Christopher J., Hadnagy | Phishing as-a-service (PHaas) used to increase corporate security awareness |
9667645, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Performance benchmarking for simulated phishing attacks |
9674221, | Feb 08 2013 | BLUE TORCH FINANCE LLC | Collaborative phishing attack detection |
9906539, | Apr 10 2015 | BLUE TORCH FINANCE LLC | Suspicious message processing and incident response |
9906554, | Apr 10 2015 | BLUE TORCH FINANCE LLC | Suspicious message processing and incident response |
Patent | Priority | Assignee | Title |
7281031, | Mar 22 2000 | EMC IP HOLDING COMPANY LLC | Method and apparatus for providing additional resources for a host computer |
7668921, | May 30 2006 | Xerox Corporation | Method and system for phishing detection |
7971246, | Apr 29 2004 | ROSKIND, JAMES A , DR | Identity theft countermeasures |
8220047, | Aug 09 2006 | GOOGLE LLC | Anti-phishing system and method |
8608487, | Nov 29 2007 | Bank of America Corporation | Phishing redirect for consumer education: fraud detection |
20070107053, | |||
20070136806, | |||
20070245422, | |||
20070250618, | |||
20070294352, | |||
20080037791, | |||
20090089859, | |||
20090144308, | |||
20090265430, | |||
20090320137, | |||
20110055922, | |||
20110246634, | |||
20120023566, | |||
JP2006285844, | |||
JP2007323640, | |||
WO2011017196, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 28 2014 | Booz Allen Hamilton Inc. | (assignment on the face of the patent) | / | |||
Dec 04 2015 | BEZRUKOV, SEMION | BOOZ ALLEN HAMILTON INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037494 | /0690 | |
Dec 04 2015 | PALKA, SEAN | BOOZ ALLEN HAMILTON INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037494 | /0690 | |
Jan 12 2016 | FRITZSON, ART | BOOZ ALLEN HAMILTON INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037494 | /0690 |
Date | Maintenance Fee Events |
Aug 23 2019 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 23 2023 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 23 2019 | 4 years fee payment window open |
Aug 23 2019 | 6 months grace period start (w surcharge) |
Feb 23 2020 | patent expiry (for year 4) |
Feb 23 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 23 2023 | 8 years fee payment window open |
Aug 23 2023 | 6 months grace period start (w surcharge) |
Feb 23 2024 | patent expiry (for year 8) |
Feb 23 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 23 2027 | 12 years fee payment window open |
Aug 23 2027 | 6 months grace period start (w surcharge) |
Feb 23 2028 | patent expiry (for year 12) |
Feb 23 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |